scholarly journals Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals

Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2424 ◽  
Author(s):  
Deeraj Nagothu ◽  
Yu Chen ◽  
Erik Blasch ◽  
Alexander Aved ◽  
Sencun Zhu

Over the past few years, the importance of video surveillance in securing national critical infrastructure has significantly increased, with applications including the detection of failures and anomalies. Accompanied by the proliferation of video is the increasing number of attacks against surveillance systems. Among the attacks, False Frame Injection (FFI) attacks that replay video frames from a previous recording to mask the live feed has the highest impact. While many attempts have been made to detect FFI frames using features from the video feeds, video analysis is computationally too intensive to be deployed on-site for real-time false frame detection. In this paper, we investigated the feasibility of FFI attacks on compromised surveillance systems at the edge and propose an effective technique to detect the injected false video and audio frames by monitoring the surveillance feed using the embedded Electrical Network Frequency (ENF) signals. An ENF operates at a nominal frequency of 60 Hz/50 Hz based on its geographical location and maintains a stable value across the entire power grid interconnection with minor fluctuations. For surveillance system video/audio recordings connected to the power grid, the ENF signals are embedded. The time-varying nature of the ENF component was used as a forensic application for authenticating the surveillance feed. The paper highlights the ENF signal collection from a power grid creating a reference database and ENF extraction from the recordings using conventional short-time Fourier Transform and spectrum detection for robust ENF signal analysis in the presence of noise and interference caused in different harmonics. The experimental results demonstrated the effectiveness of ENF signal detection and/or abnormalities for FFI attacks.


Author(s):  
Gennadiy Kamyshentsev

Gennadiy Kamyshentsev, Tetiana Tiahun, Olga Shevchenko DEVELOPMENT OF THE CONTROL ALGORITHM OF THE INFORMATION AND TECHNICAL METHOD OF ACOUSTIC CONTROL OF THE EMERGENCY OF THE TERRORISTIC HYSTERISTIC In the work on the basis of the analysis of vulnerability of objects of critical infrastructure, the structural scheme of the control algorithm of the information and technical method of acoustic control of emergence of an emergency situation of terrorist character on objects of critical infrastructure of Ukraine is developed. It is proved that the main task of the process of managing a terrorist emergency at a critical infrastructure facility is to prevent intruders from entering a protected facility by detecting and terminating their actions in a timely manner. At the same time, the range of control of detection means located on the protected object is limited to several kilometers. The use of acoustic information from external surveillance systems located at traffic interchanges, in satellite cities, controlled areas of private structures and its analysis of events occurring in the thirty-kilometer zone, will allow the collection of everyday factors to detect in advance the signs of terrorist emergencies. nature, which will significantly increase the effectiveness of the entire system of physical protection of the protected object. Accordingly, the control algorithm of the information and technical method of acoustic control of terrorist emergencies at protected critical infrastructure by integrated use of acoustic control systems within the perimeter and approaches to it consists of nineteen blocks located at seven levels. connected by logical connections, and provides distribution of data on the fixed video and audio images, their binding and identification, creates conditions for detection of hostile and obviously hostile actions against the protected object, provides registration of deviations in behavior of people , in the use of transport and other phenomena, which as a result of careful systematization of the obtained data allows to identify signs of preparation of a terrorist act against a protected object and further prevent the development of an emergency situation or prevent its spread. Key words: emergency situation, acoustic control, information and technical method



2021 ◽  
Vol 8 (2) ◽  
pp. 1001-1015
Author(s):  
Jiwei Tian ◽  
Buhong Wang ◽  
Tengyao Li ◽  
Fute Shang ◽  
Kunrui Cao ◽  
...  


Author(s):  
Alberto Ban˜o´ Azco´n ◽  
Jose´ Mollera Barriga

Broadly speaking, a simple electrical diagram of Asco´ I and Asco´ II power nuclear plants could be two power supply bus bars for general equipment classified No-1E, three power supply bus bars class No-1E for the Reactor Coolant Pumps (RCP) and two more bus bars classified 1E for safety related equipment. In normal operating mode, all the five power supply bus bars class No-1E are connected to the main generator (GP1) through two unit transformers (TAG1/2), while the two class 1E power supply bus bars are always connected to an external 110 kV power grid through two auxiliary transformer (TAA1/2). The main generator supplies power to an external 400 kV grid through the main transformer (TP1). The main circuit breaker is placed between the high voltage side of the main transformer and the 400 kV grid. With this configuration, the appearance of an abnormal condition that originates the trip of the main generator and the opening of the main circuit breaker from the external network, involves an electric transfer of the supply bus bars connected to the turbo generator to the external 110 kV power grid. The electric transfer to the external 110 kV power grid will be only possible if the frequency and voltage values are within the allowed range allowed by the grid’s protective relays. Two kinds of electrical transfers are possible: fast transfers and slow transfers. It will be necessary then to evaluate the limit values of voltage and frequency of the power grid that makes the electrical transfer possible in each case. In order to obtain the limit values previously mentioned, the electric system of the plant has been modeled. Different scenarios have been analyzed, taking into account the dynamic behavior of the system components and the delay of the protective relays actuation, verifying the electrical transfer for those situations. This analysis will give enough information to take the correct decisions for future design modifications, and it will assure that the electrical transfer will be done always with success.



2020 ◽  
Vol 12 (2) ◽  
pp. 170-178
Author(s):  
Suhardhika Sih Sudewanto

Expansion of the electrical network and substation makes a demand for better electricity system coordination. A radio communication system is one of many ways that fulfill such demand. The range of radio communication systems is limited by geographical location. Establishing a series of radio links to cover a wide area can not be considered as a solution to have good quality and reliable radio communication system anymore. Therefore, It needs one optimal location for radio repeater to cover all sites that have a crucial role in electricity system coordination. The optimal location for the mountainous geographical region is usually located in a remote area, far from civilization. It will need more effort on engineering to establish a radio repeater site. The selection method of location and development phase will be done by software simulation and actual survey to conduct testing, to determine the equipment needed to build radio repeater, and for administrative purposes. With the average fade margin of 25 dB, the location of the radio repeater is considered optimal enough to maximize electricity system coordination.



Energies ◽  
2020 ◽  
Vol 13 (15) ◽  
pp. 3862
Author(s):  
Junhyung Bae

This study presents the phasor measurement unit (PMU) placement strategy in the presence of false data injection attacks which is one of the most serious security threats against power grid. It is focused on applications related to supervisory control and data acquisition (SCADA) systems where measurement data can be easily corrupted by adversaries without getting caught by the system. To safeguard power grids against malicious attacks, procedures have been proposed to facilitate the placement of secure PMUs to defend against false data injection attacks in a highly cost-effective way. It has formulated a method of identifying measurements that are vulnerable to false data injection attacks. It was discovered that a weak power grid can be transformed into a robust power grid by adding a few PMUs at vulnerable locations. Simulations on the IEEE standard test systems demonstrate the benefits of the proposed procedure.



Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1253
Author(s):  
Bertalan Beszédes ◽  
Károly Széll ◽  
György Györök

The conversion of solar energy into electricity makes it possible to generate a power resource at the relevant location, independent of the availability of the electrical network. The application of the technology greatly facilitates the supply of electricity to objects that, due to their location, cannot be connected to the electrical network. Typical areas of use are nature reserves, game management areas, large-scale agricultural areas, large-scale livestock areas, industrial pipeline routes, water resources far from infrastructure, etc. The protection of such areas and assets and the detection of their functionality are of particular importance, sectors classified as critical infrastructure are of paramount importance. This article aims to show the conceptual structure of a possible design of a high-reliability, redundant, modular, self-monitoring, microcontroller-controlled system that can be used in the outlined areas.



Energies ◽  
2021 ◽  
Vol 14 (20) ◽  
pp. 6476
Author(s):  
Jesse Dugan ◽  
Salman Mohagheghi ◽  
Benjamin Kroposki

Natural disasters can lead to large-scale power outages, affecting critical infrastructure and causing social and economic damages. These events are exacerbated by climate change, which increases their frequency and magnitude. Improving power grid resilience can help mitigate the damages caused by these events. Mobile energy storage systems, classified as truck-mounted or towable battery storage systems, have recently been considered to enhance distribution grid resilience by providing localized support to critical loads during an outage. Compared to stationary batteries and other energy storage systems, their mobility provides operational flexibility to support geographically dispersed loads across an outage area. This paper provides a comprehensive and critical review of academic literature on mobile energy storage for power system resilience enhancement. As mobile energy storage is often coupled with mobile emergency generators or electric buses, those technologies are also considered in the review. Allocation of these resources for power grid resilience enhancement requires modeling of both the transportation system constraints and the power grid operational constraints. These aspects are discussed, along with a discussion on the cost–benefit analysis of mobile energy resources. The paper concludes by presenting research gaps, associated challenges, and potential future directions to address these challenges.



Sign in / Sign up

Export Citation Format

Share Document